scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings ArticleDOI
27 May 2022
TL;DR: This project provides a better understanding on how phishing attacks are carried out by attackers and how these attacks are detected by websites that uses various detection methods.
Abstract: In the modern world, where everyone is connected with internet, a threat has always surrounded every internet user which steals user credentials by various means; this threat is known as Phishing. The attacker acts as a trustworthy agent and steals victim’s credentials or personal details. This information is then used for illegal purpose which may result in identity theft or financial loss. This project provides a better understanding on how phishing attacks are carried out by attackers and how these attacks are detected by websites that uses various detection methods. A tool is designed using machine learning and deep neural net which classify Uniform Resource Locator (URLs) as phishing or legitimate URL. Dataset is collected from various resources that contain phishing and legitimate URLs of websites and then these datasets are provided to the neural net for supervised training. Various classification algorithms are, then, applied on these datasets and then accuracy of these algorithms is predicted.
Journal ArticleDOI
TL;DR: In this paper , a new approach that uses visual cryptography and steganography is proposed to enhance the security of the user's confidential information and protect them from phishing attacks, which will help the user keep its identity and login credentials confidential unless the website proves its trustworthiness.
Abstract: In new technologies developing tremendously, and with this, the usage of online commodities has also seen a surge with a drastic daily increase in the number of users. Online support has also led to increased online attacks on the user's confidential data, leading to financial and social loss. Phishing is one such online attack using which an attacker impersonates any authentic organisation to deceive and take advantage of users to steal various private information like passwords, payment card details, etc. These days, attackers have easy access to new tools and techniques which can easily evade many existing anti-phishing techniques. To enhance the security of the user's confidential information and protect them from such phishing attacks, this paper proposes a new approach that uses visual cryptography and steganography. This approach will help the user keep its identity and login credentials confidential unless the website proves its trustworthiness.
Posted Content
TL;DR: The central argument will be that increased compliance with the key principles is not only appropriate for a distributed privacy environment but will go some way towards creating a space for various stakeholders to reach consensus applicable to existing and new information communication technologies.
Abstract: Identity and its management is now an integral part of web based services and applications. It is also a live political issue that has captured the interest of organisations, businesses and society generally. High profile security breaches, the spread of online criminality and identity theft have led to increased focus on the design and implementation of sound identity management systems. Virtualisation of data not only raises issues concerning security. As identity management systems assume functionally equivalent roles like authentication, accreditation and determining access, their significance for privacy cannot be underestimated. The Center for Democracy & Technology (CDT) has recently released a draft version of what it regards as key privacy principles for identity management in the digital age. This paper will provide an overview of the key benchmarks identified by the CDT. The focus of this paper is to explore how best the Data Protection legislation can be said to provide a framework which best maintains a proper balance between "identity" conscious technology and an individual's expectation of privacy to personal and sensitive data. The central argument will be that increased compliance with key principles is not only appropriate for a distributed privacy environment but will go some way towards creating a space for various stakeholders to reach consensus relating to the standards applicable to existing and new information communication technologies. The Data Protection legislation provides the basis for achieving an optimal balance between security and privacy concerns. The conclusion however is that securing compliance with the legislation will prove to be the biggest governance challenge - standard setting and norms will go some way to ease the need for centralized regulatory oversight.
Patent
Kourtney Eidam1
02 Jan 2015
TL;DR: In this article, a customer service document with an electrical data storage device is provided to deliver customer service information in a secured manner, which can be used by the data reading device in various applications without identity theft concerns.
Abstract: A customer service document with an electrical data storage device is provided to deliver customer service information in a secured manner. The data storage device is attached to the customer service document and configured to contain information to be transferred to a customer's data reading device via short-range communication once the data reading device is authenticated. The transferred information can be used by the data reading device in various applications without identity theft concerns.

Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112